0% found this document useful (0 votes)
4 views

Module_6_Memory_Management_and_Security

Module 6 covers memory management and security in operating systems, detailing memory allocation methods such as paging and segmentation, and the concept of virtual memory. It also discusses security threats, authentication techniques, cryptography, and access control mechanisms. Additionally, it addresses issues like deadlock and thrashing, along with prevention and avoidance strategies.

Uploaded by

shanne724
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Module_6_Memory_Management_and_Security

Module 6 covers memory management and security in operating systems, detailing memory allocation methods such as paging and segmentation, and the concept of virtual memory. It also discusses security threats, authentication techniques, cryptography, and access control mechanisms. Additionally, it addresses issues like deadlock and thrashing, along with prevention and avoidance strategies.

Uploaded by

shanne724
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 6: Memory Management and Security

1. What is Memory Management in OS?


- Memory management is the process of controlling and coordinating computer memory,
assigning blocks to processes, and optimizing overall system performance.

2. What are the different Memory Allocation Methods?


- Single Contiguous Allocation
- Partitioned Allocation (Fixed and Dynamic)
- Paging
- Segmentation

3. What is Paging in OS?


- Paging is a memory management scheme that eliminates external fragmentation by
dividing memory into fixed-size pages and mapping them to frames.

4. What is Segmentation in OS?


- Segmentation divides the process into variable-sized sections, each representing a logical
unit such as functions, arrays, or stacks.

5. What is Virtual Memory?


- Virtual memory allows the OS to use disk space as additional RAM, improving multitasking
capabilities.

6. What are Page Replacement Algorithms?


- FIFO (First-In-First-Out)
- LRU (Least Recently Used)
- Optimal Page Replacement
- LFU (Least Frequently Used)

7. What is Thrashing in OS?


- Thrashing occurs when excessive paging reduces performance, causing the system to
spend more time swapping pages than executing processes.

8. What is Deadlock in OS?


- A situation where two or more processes are stuck waiting for resources held by each
other, preventing progress.

9. What are Deadlock Prevention and Avoidance Techniques?


- Prevention: Hold and Wait, No Preemption, Circular Wait.
- Avoidance: Banker’s Algorithm.
10. What are Security Threats in OS?
- Malware (Virus, Worms, Trojan)
- Phishing Attacks
- Denial of Service (DoS) Attacks

11. What are the Authentication Techniques in OS?


- Password-Based Authentication
- Biometric Authentication
- Multi-Factor Authentication

12. What is Cryptography in OS Security?


- The practice of securing data using encryption techniques like AES, RSA, and hashing
algorithms.

13. What is Access Control in OS Security?


- Mechanisms to restrict user access to files and resources based on permissions and
policies.

You might also like